Security Blogs

Latest Articles

Building a Cross-Functional Remote Employment Fraud Response Team
Security
7 Minute Read

Building a Cross-Functional Remote Employment Fraud Response Team

In this blog, Splunkers Jonathan Heckinger and Brian Starrs cover the most complex aspect of REF risk: what to do after you find it.
From Prompt to Payload: LAMEHUG’s LLM-Driven Cyber Intrusion
Security
10 Minute Read

From Prompt to Payload: LAMEHUG’s LLM-Driven Cyber Intrusion

The Splunk Threat Research Team analyzes the LAMEHUG malware, examining its tactics and techniques to provide insights that can help SOC analysts and blue teamers identify and respond.
Going Beyond Today’s Asset and Risk Intelligence: What’s New in Splunk ARI 1.2
Security
3 Minute Read

Going Beyond Today’s Asset and Risk Intelligence: What’s New in Splunk ARI 1.2

With the improvements within Splunk’s ARI 1.2, organizations can further improve aligning their vulnerabilities, misconfigurations, and threat activity with the business value of each asset.